This post is courtesy of Ronnie Shelley, IAM Segment Manager for IBM Security.
Organizations of all sizes are facing the same dilemma today. The online tools and applications you use to open up communications with customers, enable a mobile workforce, and...

This post was contributed by Brian Fitch, Product Manager for Network Protection.
The Tolly Group has just released a security efficacy report on the IBM Security Network IPS GX7800. The GX7800 was compared to open source SNORT version 2.9.3.1 and the...

This post is courtesy of Mark Simmonds, Product Marketing for Data Governance and System z .
Previously I talked about the security of information and highlighted some of the capabilities among others of the InfoSphere Guardium solution for the System z...

This post was written by Anne Lescher, Product Marketing Manager with IBM Security Solutions.
One of the biggest challenges is protecting sensitive information, and one of the biggest fears is losing that information to hackers. Who has not worried...

This post is contributed by Glinda Cummings, WW Senior IBM Security Solutions Product Manager for zSecure
Remember the good old days when we did our work from a dumb terminal, or worked remotely on the mainframe? Then came the personal...

This post is contributed by Kim Madia, World Wide Product Marketing Manager for Infosphere.
IOUG recently published an interesting study on how data is used and shared internally and externally. The report, Testing the bounds of Data Governance ,...

This post is courtesy of Ronnie Shelley, IAM Segment Manager for IBM Security.
Like many of today’s IT trends, the move to desktop virtualization is often driven by economics and the need to wring more efficiencies out of overstretched IT resources....

This post was contributed by Kimber Spradlin, Product Marketing at IBM Security for BigFix/ Endpoint.
Guess what? All those regulations like PCI, HIPAA, SOX, and the many Data Privacy Laws that say helpful things like “thou shalt document and enforce...

This is an excerpt from a post on the Q1 Labs Security Intelligence blog , contributed by Michael Applebaum, Director of Product & Segment Marketing at IBM Security Systems. You can follow him on Twitter at @ma08 .
If you want to skate to where...

This post was contributed by Richard Mayo, WW Product Marketing Manager - Tivoli Endpoint Manager.
Just a few years ago the endpoint management domain was most PCs and laptops. Now multiple forces are at work, driving IT to manage a plethora of new...

This post was written by Perry Swenson, Segment Manager for IBM Security.
Adoption of new technology has historically started within IT, and then slowly made its way to consumers. But mobile technologies have reversed that pattern. All types of...

This post is courtesy of Ronnie Shelley, IAM Segment Manager for IBM Security.
In the next three years, IBM anticipates that clients will increase the pace of cloud implementations by 215%. This forecast illustrates exceptional interest in and...

This post is written by Archit Lohokare, Product Manager for IBM Security Systems.
By now, Matt Honan’s nightmarish experience of his accounts being hacked has been echoed by many other individuals who’ve faced similar disruptions to their online lives. ...

This post is contributed by Kim Madia, World Wide Product Marketing Manager for Infosphere.
During a recent trip to a client site, we gathered key stakeholders from across business units to discuss the broad topic of Data Governance. As part of the...

Start a Blog

Starting a Blog
Blogs are online journals that you can use to share information, News and views. Within the ibm.com Connections community, all blogs (EXCEPT private Community Blogs) are public and they are indexed in Google. A blog can have multiple authors and a blog owner can add others as authors and enable moderation to review and approve entries and comments before they are published. An IBM ID is required to post blog entries and comments. If you do not have an IBM ID, register now.Who can own a blog?
Only an IBM regular employee can start a blog. The IBM blog owner can add IBM employees or non-IBM employees (business partners, clients, contractors, vendors) as authors. All blog owners and authors must comply with thecontent owner responsibilities. The IBM blog owner must ensure that all content contributors to his/her blog are aware of the responsibilities referenced above.
(IBM employees: You are required to review this Social computing education module before proceeding.)
Terms of Use
When contributing content (including, but not limited to text, images, links, videos), you must comply with the ibm.com Connections Terms of Use.br>
By clicking Continue, you agree to these ibm.com Connections Terms of Use.